Search

Your search keyword '"CONTI, MAURO"' showing total 189 results

Search Constraints

Start Over You searched for: Author "CONTI, MAURO" Remove constraint Author: "CONTI, MAURO" Topic computer science - cryptography and security Remove constraint Topic: computer science - cryptography and security
189 results on '"CONTI, MAURO"'

Search Results

1. EmoBack: Backdoor Attacks Against Speaker Identification Using Emotional Prosody

2. MoRSE: Bridging the Gap in Cybersecurity Expertise with Retrieval Augmented Generation

3. Obfuscated Location Disclosure for Remote ID Enabled Drones

4. Your Car Tells Me Where You Drove: A Novel Path Inference Attack via CAN Bus and OBD-II Data

5. SeCTIS: A Framework to Secure CTI Sharing

6. Deep Learning Fusion For Effective Malware Detection: Leveraging Visual Features

7. GAN-GRID: A Novel Generative Attack on Smart Grid Stability Prediction

8. Work-in-Progress: Crash Course: Can (Under Attack) Autonomous Driving Beat Human Drivers?

9. Securing the Open RAN Infrastructure: Exploring Vulnerabilities in Kubernetes Deployments

10. Offensive AI: Enhancing Directory Brute-forcing Attack with the Use of Language Models

11. RedactBuster: Entity Type Recognition from Redacted Documents

12. CANEDERLI: On The Impact of Adversarial Training and Transferability on CAN Intrusion Detection Systems

13. 'Are Adversarial Phishing Webpages a Threat in Reality?' Understanding the Users' Perception of Adversarial Webpages

14. FaultGuard: A Generative Approach to Resilient Fault Prediction in Smart Electrical Grids

15. Kronos: A Secure and Generic Sharding Blockchain Consensus with Optimized Overhead

16. Exploring Jamming and Hijacking Attacks for Micro Aerial Drones

17. Federated Learning Under Attack: Exposing Vulnerabilities through Data Poisoning Attacks in Computer Networks

18. Penetration Testing of 5G Core Network Web Technologies

19. Augmenting Security and Privacy in the Virtual Realm: An Analysis of Extended Reality Devices

20. A Survey on Decentralized Identifiers and Verifiable Credentials

21. 'All of Me': Mining Users' Attributes from their Public Spotify Playlists

22. A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols

23. Privacy-Preserving in Blockchain-based Federated Learning Systems

24. DynamiQS: Quantum Secure Authentication for Dynamic Charging of Electric Vehicles

25. Topology-Based Reconstruction Prevention for Decentralised Learning

26. Dr. Jekyll and Mr. Hyde: Two Faces of LLMs

27. NLP-Based Techniques for Cyber Threat Intelligence

28. Invisible Threats: Backdoor Attack in OCR Systems

29. AGIR: Automating Cyber Threat Intelligence Reporting with Natural Language Generation

30. De-authentication using Ambient Light Sensor

31. HoneyEVSE: An Honeypot to emulate Electric Vehicle Supply Equipments

32. Your Battery Is a Blast! Safeguarding Against Counterfeit Batteries with Authentication

33. Label Inference Attacks against Node-level Vertical Federated GNNs

34. EPUF: A Novel Scheme Based on Entropy Features of Latency-based DRAM PUFs Providing Lightweight Authentication in IoT Networks

35. Can Twitter be used to Acquire Reliable Alerts against Novel Cyber Attacks?

36. Your Attack Is Too DUMB: Formalizing Attacker Scenarios for Adversarial Transferability

37. Twitter Bots Influence on the Russo-Ukrainian War During the 2022 Italian General Elections

38. When Authentication Is Not Enough: On the Security of Behavioral-Based Driver Authentication Systems

39. Turning Privacy-preserving Mechanisms against Federated Learning

40. Boosting Big Brother: Attacking Search Engines with Encodings

41. Spritz-PS: Validation of Synthetic Face Images Using a Large Dataset of Printed Documents

42. Social Honeypot for Humans: Luring People through Self-managed Instagram Pages

43. Differential Area Analysis for Ransomware: Attacks, Countermeasures, and Limitations

44. STIXnet: A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports

45. Cryptocurrency wallets: assessment and security

46. Beware of Pickpockets: A Practical Attack against Blocking Cards

47. SoK: A Systematic Evaluation of Backdoor Trigger Characteristics in Image Classification

48. Electric Vehicles Security and Privacy: Challenges, Solutions, and Future Needs

49. Devils in the Clouds: An Evolutionary Study of Telnet Bot Loaders

50. Going In Style: Audio Backdoors Through Stylistic Transformations

Catalog

Books, media, physical & digital resources